2017-07-15 03:41:49 +09:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'rails_helper'
|
|
|
|
|
|
|
|
describe Request do
|
|
|
|
subject { Request.new(:get, 'http://example.com') }
|
|
|
|
|
|
|
|
describe '#headers' do
|
|
|
|
it 'returns user agent' do
|
|
|
|
expect(subject.headers['User-Agent']).to be_present
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns the date header' do
|
|
|
|
expect(subject.headers['Date']).to be_present
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns the host header' do
|
|
|
|
expect(subject.headers['Host']).to be_present
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not return virtual request-target header' do
|
|
|
|
expect(subject.headers['(request-target)']).to be_nil
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '#on_behalf_of' do
|
|
|
|
it 'when used, adds signature header' do
|
|
|
|
subject.on_behalf_of(Fabricate(:account))
|
|
|
|
expect(subject.headers['Signature']).to be_present
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '#add_headers' do
|
|
|
|
it 'adds headers to the request' do
|
|
|
|
subject.add_headers('Test' => 'Foo')
|
|
|
|
expect(subject.headers['Test']).to eq 'Foo'
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '#perform' do
|
2018-02-25 03:16:11 +09:00
|
|
|
context 'with valid host' do
|
2018-03-24 20:49:54 +09:00
|
|
|
before { stub_request(:get, 'http://example.com') }
|
2018-02-25 03:16:11 +09:00
|
|
|
|
|
|
|
it 'executes a HTTP request' do
|
2018-03-24 20:49:54 +09:00
|
|
|
expect { |block| subject.perform &block }.to yield_control
|
2018-02-25 03:16:11 +09:00
|
|
|
expect(a_request(:get, 'http://example.com')).to have_been_made.once
|
|
|
|
end
|
2017-07-15 03:41:49 +09:00
|
|
|
|
2018-03-20 17:06:08 +09:00
|
|
|
it 'executes a HTTP request when the first address is private' do
|
|
|
|
allow(Addrinfo).to receive(:foreach).with('example.com', nil, nil, :SOCK_STREAM)
|
|
|
|
.and_yield(Addrinfo.new(["AF_INET", 0, "example.com", "0.0.0.0"], :PF_INET, :SOCK_STREAM))
|
|
|
|
.and_yield(Addrinfo.new(["AF_INET6", 0, "example.com", "2001:4860:4860::8844"], :PF_INET6, :SOCK_STREAM))
|
2018-03-24 20:49:54 +09:00
|
|
|
|
|
|
|
expect { |block| subject.perform &block }.to yield_control
|
2018-03-20 17:06:08 +09:00
|
|
|
expect(a_request(:get, 'http://example.com')).to have_been_made.once
|
|
|
|
end
|
|
|
|
|
2018-02-25 03:16:11 +09:00
|
|
|
it 'sets headers' do
|
2018-03-24 20:49:54 +09:00
|
|
|
expect { |block| subject.perform &block }.to yield_control
|
2018-02-25 03:16:11 +09:00
|
|
|
expect(a_request(:get, 'http://example.com').with(headers: subject.headers)).to have_been_made
|
|
|
|
end
|
2018-03-24 20:49:54 +09:00
|
|
|
|
|
|
|
it 'closes underlaying connection' do
|
|
|
|
expect_any_instance_of(HTTP::Client).to receive(:close)
|
|
|
|
expect { |block| subject.perform &block }.to yield_control
|
|
|
|
end
|
2017-07-15 03:41:49 +09:00
|
|
|
end
|
|
|
|
|
2018-02-25 03:16:11 +09:00
|
|
|
context 'with private host' do
|
|
|
|
around do |example|
|
|
|
|
WebMock.disable!
|
|
|
|
example.run
|
|
|
|
WebMock.enable!
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'raises Mastodon::ValidationError' do
|
2018-03-20 17:06:08 +09:00
|
|
|
allow(Addrinfo).to receive(:foreach).with('example.com', nil, nil, :SOCK_STREAM)
|
|
|
|
.and_yield(Addrinfo.new(["AF_INET", 0, "example.com", "0.0.0.0"], :PF_INET, :SOCK_STREAM))
|
|
|
|
.and_yield(Addrinfo.new(["AF_INET6", 0, "example.com", "2001:db8::face"], :PF_INET6, :SOCK_STREAM))
|
2018-02-25 03:16:11 +09:00
|
|
|
expect{ subject.perform }.to raise_error Mastodon::ValidationError
|
|
|
|
end
|
2017-07-15 03:41:49 +09:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|